You are on page 1of 8

IOT Questions and Answers – IoT Characteristics and Reliability Issues

This set of IOT online quiz focuses on “IoT Characteristics and Reliability Issues”.

1. Which characteristics involve the facility the thing to respond in an intelligent way to a particular
situation?

a) Intelligence

b) Connectivity

c) Dynamic Nature

d) Enormous Scale

View Answer

2. ________ empowers IoT by bringing together everyday objects.

a) Intelligence

b) Connectivity

c) Dynamic Nature

d) Enormous Scale

View Answer

3. The collection of data is achieved with ________ changes.

a) Intelligence

b) Connectivity

c) Dynamic Nature

d) Enormous Scale

View Answer

4. The number of devices that need to be managed and that communicate with each other will be much
larger.

a) Intelligence

b) Connectivity
c) Dynamic Nature

d) Enormous Scale

View Answer

5. ________ Provide the means to create capability that reflects true awareness of the physical world
and people.

a) Sensors

b) Heterogeneity

c) Security

d) Connectivity

View Answer

6. ________ in IoT as one of the key characteristics, devices have different hardware platforms and
networks.

a) Sensors

b) Heterogeneity

c) Security

d) Connectivity

View Answer

7. IoT devices are naturally vulnerable to ________ threats.

a) Sensors

b) Heterogeneity

c) Security

d) Connectivity

View Answer

8. Which challenge comes under IoT devices, reliable bidirectional signaling.

a) Signaling
b) Security

c) Presence detection

d) Power consumption

View Answer

9. Which challenge comes under securing the information?

a) Signaling

b) Security

c) Presence detection

d) Power consumption

View Answer

10. ________ gives an exact, up to the second state of all devices on a network.

a) Signaling

b) Security

c) Presence detection

d) Power consumption

View Answer

11. Which challenge comes when we use many devices on the same network?

a) Signaling

b) Security

c) Presence detection

d) Power consumption

12. ________ a cellular network is expensive, especially with many IoT devices.

a) Signaling

b) Security

c) Bandwidth

d) Power consumption
13. Which of the following issues are considered in IoT?

a) Security Issue

b) Reliablity Issue

c) Standard Issue

d) All issues

15. IoT is a paradigm that involves ubiquitous presence in the environment.

a) True

b) False

16. Application layer interacts directly with the ________

a) front user

b) end user

c) sensors

d) wired link

9. Hardware address is known as _________

a) MAC address

b) IP Address

c) Network Interface Card

d) Address Resolution Protocol

12. MAC stands for ________

a) Media Area Control

b) Memory Access Control

c) Memory Area Control

d) Media Access Control

13. What translates IP address into MAC address?

a) Organizationally Unique Identifier

b) Address Resolution Protocol


c) Network Interface Card

d) Burned In Address

4. Networking Hardware Address is referred with ________

a) IP address

b) MAC address

c) NIC

d) Organizationally Unique Identifier

5. Does MAC address contain characters.

a) True

b) False

6. MAC addresses are very useful in diagnosing network issues.

a) True

b) False

7. On wireless networks ________ filtering is the security measure.

a) OUI

b) IP

c) NIC

d) MAC

8. MAC addresses are used as ________

a) Network addresses

b) IP address

c) Hardware address

d) Burned in address
9. IEEE standards for Institute of Electrical and Electronics Engineers.

a) False

b) True

10. The original IEEE 802 MAC address comes from________

a) MAC address

b) IP address

c) Ethernet address

d) Http

------------------

4. What will Security provide?

a) Saves privacy

b) Long term security

c) Secure remote management

d) all of the above

10. Which transportation build more intelligent energy infracture?

a) Building Automation

b) Industrial Automation

c) Smart Energy

d) Route Navigation

3. The availability of ________ is the cloud services provider who will host video and data for end users.

a) Devices

b) Memory

c) Security system

d) Objects

9. ________ are designed to protect data and servers.


a) Physical walls

b) Logical firewalls

c) Both Physical and logical

d) Neither physical nor logical

10. Communication between ________ and ________ is encrypted for security.

a) Cloud and device

b) End user and data center

c) Network and device

d)all of the above

11. Undertaking the intervention over an extended period of time would enhance the change of gaining
access.

a) True

b) False

View Answer

12. ________ phase starts with the construction of spanning tree for ordinary routing information.

a) Initialization

b) Message Relaying

c) Selective recovery

d) Lost message detection

13. In which phase packets are forwarded hop by hop to get closer to the sink?

a) Initialization

b) Message Relaying

c) Selective recovery

d) Lost message detection


14. ________ is achieved using over hearing mechanism.

a) Initialization

b) Message Relaying

c) Selective recovery

d) Lost message detection

View Answer

15. What is the last step in algorithm for reliable data transfer?

a) Initialization

b) Message Relaying

c) Selective recovery

d) Lost message detection

You might also like